Author:
Rosulek Mike,Shirley Morgan
Publisher
Springer International Publishing
Reference21 articles.
1. Beaver, D.: Perfect privacy for two-party protocols. In: Feigenbaum, J., Merritt, M. (eds.) Proceedings of DIMACS Workshop on Distributed Computing and Cryptography, vol. 2, pp. 65–77. American Mathematical Society (1989)
2. Lecture Notes in Computer Science;A Beimel,2004
3. Lecture Notes in Computer Science;M Bellare,2006
4. Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: 42nd FOCS, pp. 136–145. IEEE Computer Society Press, October 2001
5. Lecture Notes in Computer Science;Y Dodis,1999
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献